Well the Illuminati will not succeed with making the entire world gay whew What a relief! These people need to shut down hollywood and the music industry that they have so skillfully created. The underground worlds of open music, open source, open government, open money, open culture, open society, open courseware, open university, and open classroom have given new meaning to couter-capitalism since the number of people that use these non-traditional methods for career building, wealth building, and for gaining the equivalent necessary skills for anything to include perquisite job skills and training. These new techniques of amassing the equivalent specialized knowledge when compared to completing one or more university degrees is certainly a real testament for redefining what it means to learn, buy, sell, conduct business, communicate, meet, share, and for a person to get their first “big job” by pasted conventional means.

Dr. G. Brock M.D. sold a lie that psychiatrists and psychotherapists used to buy, resell, made the sick sicker, both physically and mentally, and caused a shorter life span of the normal average human being

The NSA – and so the US government – has been careful to avoid any suggestion that the monitoring is being carried out indiscriminately on US citizens, because that would potentially breach the fourth amendment of the constitution against "unreasonable search"

But people overseas get no such protections. The question then is whether UK and EU governments knew of the scheme and were compliant – and whether they could stop it even if they wanted to.

US companies that want to process private data from EU citizens have to promise a "safe harbor" – but crucially the documents do not mention tapping by US law enforcement. And if disputes arise, the rules say: "Claims brought by EU citizens against US organizations will be heard, subject to limited exceptions, in the US." That would probably mean the NSA's license to spy would trump EU complaints.

Lots of internet traffic from the west passes through the US because the destination servers are there, or connect there. Encrypting email usingPGP is one possibility, though it is not easy to set up. Systems such as, together with a virtual private network (VPN) connection, can cloak your location, though your identity might still be inferred from the sites you connect to.

It's one of the most ominous terms in the history of modern governments and intelligence, nearly on a par with the names of Josef Mengele and Pol Pot. For 20 years from 1953 to 1973, the American Central Intelligence Agency funded and conducted tests on human subjects, both with and without their knowledge, in an effort to control minds and personalities for the purpose of espionage. Most notorious for administering the psychedelic drug LSD to people without their knowledge or consent, MKULTRA has since become a cornerstone of conspiracy theorists flaunting it almost gleefully as proof of the government's misdeeds against its own private citizens. And the scary part is that it's completely true.

The short version of the MKULTRA story is that the CIA spent a long time trying to control minds. After performing all kinds of dastardly and unethical testing, they found they couldn't reliably achieve their goals, and terminated the program. That's it. It's important to keep it in context, both what it was and what it wasn't. It's evidence that the government tried something that didn't work. It's also evidence that the government has been proven willing to bend the rules; and by "bending the rules" I mean breaking laws and violating both civil rights and ethics at every level. But with this said, MKULTRA does not constitute evidence that similar projects continue today. Maybe they do, but logically, MKULTRA is not that proof.

So let's look at how this all came about and what exactly happened. The cold war started basically as soon as the smoke cleared from World War II, and the Western bloc and the Communist bloc immediately became suspicious of one another. In 1949, the highest ranking Catholic archbishop in Communist Hungary, Cardinal József Mindszenty, was marched into court where he had been charged with treason for trying to undermine the Communist government. Mindszenty, who was innocent, mechanically confessed in court to a long list of crimes including stealing Hungary's crown jewels, planning to depose the government, start World War III, and then seize power himself. The CIA watched this, noted his strange behavior while making the confessions, and concluded that he must have been brainwashed. They saw American prisoners of war in North Korea make anti-Amerian statements on camera. Clearly, some response was needed to this apparent Communist ability. They contrived to develop mind control techniques.

One such project was called MKULTRA. MK meant the project was run by the CIA's Technical Services Staff, and Ultra was a reference to the highest level of security. But although MKULTRA is the poster child, there were other similar projects. It had spawned from project ARTICHOKE, founded in 1951 to study hypnosis and morphine addiction. There was also MKSEARCH, MKOFTEN, project BLUEBIRD, a whole raft of related programs. The US military, separate from the CIA, also conducted its own research. Project CHATTER, part of the US Navy, ran from 1947 to 1953, when MKULTRA took over.

At the time, both psychology and psychopharmacology were in their infancies. We didn't really know whether the CIA's goals were achievable or not; whether it was or was not possible to exert a finely tuned influence on people's minds. During the cold war's golden era of espionage, this was a major national security question. The CIA had to know whether this was something they could do; because if it was, it was something the KGB could do right back at them. While nuclear physicists on both sides were building bigger and bigger hydrogen bombs, psychologists and chemists were working to fight the cold war on a much subtler front.

The CIA is not a scientific research organization, and so it needed to contract out the vast majority of this work. The CIA set up front groups, such as the Society for the Investigation for Human Ecology, to fund projects at universities and hospitals in such a way that nobody realized the CIA was involved. Some 86 such institutions are known to have received funding as part of MKULTRA. The vast majority of researchers were unaware that their programs were funded by the CIA, and accordingly, did their work as they normally would according to ethical standards of the day. Some researched forms of hypnosis, some did trials on a variety of drugs intended to work as truth serums, some did various psychiatric or psychological studies trying to learn what made people tick and how that tick might be manipulable. In fact, just about every bizarre experiment you might have read about probably was tried to some degree by some MKULTRA funded researcher. Granted the ethical standards of the 1950s and 1960s were not what they are today, but still there was very little intentional harm done by nearly all MKULTRA funded programs. Nevertheless, the exceptions were exceptional indeed.

Research done at McGill University by Dr. Donald Cameron took patients who came in with minor psychiatric complaints and subjected them to outrageous treatments. Some were given electroshock therapy at many times the normal voltage, some were given LSD, some were given other experimental or illegal drugs, all under the license granted by MKULTRA. Many reports state that some patients left with lifelong disabilities.

The Addiction Research Center at the Public Health Service Hospital in Lexington, KY was also secretly on the CIA's payroll. Dr. Harris Isbell took patients who came in to seek treatment for drug addiction and gave them massive doses of LSD, heroin, methamphetamine, and psychedelic mushrooms. In one experiment he put seven patients on LSD for 77 days straight.

I could fill a month of episodes giving such brief examples of the MKULTRA projects that are known. The main thing we know is that it didn't work.

Nothing that came out of MKULTRA panned out as very useful from an espionage perspective; in short, the CIA was never able to achieve the type of mind control that it wanted, and so the program was eventually terminated (other related programs from other agencies continued for some time with similar results). Because of the secrecy and ethical violations, the CIA destroyed all the documents, with the exception of a few that have turned up here and there over the years from misplaced archives. What remains has all been declassified, and can now be freely downloaded. From a purely scientific perspective, there's nothing there that isn't old hat to modern psychiatry and psychopharmacology; MKULTRA never learned anything that we don't know now. From an ethical perspective, documents of some cases exist, and some don't. It's probable that we don't know the worst of the ethical violations, and possible that we never will.

Friday, July 11, 2014

Psychologists and psychiatrists are both of the types of individuals of whom suffer from control issues, deep seated resentments towards their fellow human beings, issues with rage disorder, symptoms of paranoia that are directly linked to their past experiences, and suffer from several other mental disorders that are listed and defined in the Diagnostic and Statistical Manual of Mental Disorders.

These are not the type of people that you want to have as friends or meet for the first time, or go out on a date with. You will want to avoid these types of people at all costs, since they not only are they distributive types of people, but they also a considerable threat to society.

Microsoft was the first to be included, in September 2007. Yahoo followed in March 2008, Google in January 2009, Facebook in June 2009, Paltalk, a Windows- and mobile-based chat program, in December 2009, YouTube in September 2010, Skype in February 2011 (before its acquisition by Microsoft), AOL in March 2011 and finally Apple in October 2012.

How long has it been going on?

The NSA has allegedly had means of monitoring internet communications as far back as Microsoft's Windows 95, the first version of Windows with built-in internet connectivity, in 1995. This specific project appears to have begun with monitoring in September 2007 of user data going to and from Microsoft.

The budget given in the presentation is comparatively tiny – just $20m per year. That has puzzled experts because it's so low.

How effective has it been?

Nobody knows. The US government has said that the monitoring schemes it runs are necessary to defend against terrorist threats. But it hasn't cited any threats that were thwarted – unsurprising, given that the scheme has only just become public.

Isn't it illegal?

The NSA – and so the US government – has been careful to avoid any suggestion that the monitoring is being carried out indiscriminately on US citizens, because that would potentially breach the fourth amendment of the constitution against "unreasonable search".

But people overseas get no such protections. The question then is whether UK and EU governments knew of the scheme and were compliant – and whether they could stop it even if they wanted to.

What about "safe harbour" rules for EU data?

US companies that want to process private data from EU citizens have to promise a "safe harbour" – but crucially the documents do not mention tapping by US law enforcement. And if disputes arise, the rules say: "Claims brought by EU citizens against US organizations will be heard, subject to limited exceptions, in the US." That would probably mean the NSA's licence to spy would trump EU complaints.

How does it work?

The NSA isn't saying. Sources in the data-processing business point to a couple of methods. First, lots of data bound for those companies passes over what are called "content delivery networks" (CDNs), which are in effect the backbone of the internet. Companies such as Cisco provide "routers" which direct that traffic. And those can be tapped directly, explains Paolo Vecchi of Omnis Systems, based in Falmer, near Brighton.

"The Communications Assistance for Law Enforcement Act (Calea) passed in 1994 forces all US manufacturers to produce equipment compliant with that law," says Vecchi. "And guess what: Cisco is one of the companies that developed and maintains that architecture." Cisco's own documents explain its Calea compliance.

Second, it would be possible to tap into the routers at US national boundaries (to capture inbound international traffic) and just search for desired traffic there.

"The Prism budget – $20m – is too small for total surveillance," one data industry source told the Guardian. Twitter, which is not mentioned in the Prism slides, generates 5 terabytes of data per day, and is far smaller than any of the other services except Apple. That would mean skyrocketing costs if all the data were stored. "Topsy, which indexes the whole of Twitter, has burned through about $20m in three years, or about $6m a year," the source pointed out. "With Facebook much bigger than Twitter, and the need to run analysts etc, you probably couldn't do the whole lot on $20m."

Instead, the source suggests, "they might have search interfaces (at an administrator level) into things like Facebook, and then when they find something of interest can request a data dump. These localised data dumps are much smaller."

So the NSA would only need to tap the routers?

Not quite. Much of the traffic going to the target companies would be encrypted, so even when captured it would look like a stream of digital gibberish. Decrypting it would require the "master keys" held by the companies.

Did the companies know?

They say not. Those which have been contacted have all denied knowledge of it: Google, for example, said: "Google does not have a 'back door' for the government to access private user data." An Apple spokesman said: "We have never heard of Prism. We do not provide any government agency with direct access to our servers and any agency requesting customer data must get a court order."

The Washington Post retracted part of its story about Prism in which it said that the companies "knowingly" participated. Instead, it quotes a report which says that "collection managers [could send] content tasking instructions directly to equipment installed at company-controlled locations".

It is ambiguous whether "company" refers to the NSA or the internet companies. But the implication seems to be that the NSA has been running a system that can tap into the internet when it wants.

How could the companies not know if they had provided master decryption keys?

They might be required to provide them under US law, but would not be allowed to disclose the fact. That would give the NSA all it needed to monitor communications.

Is there anything I can do to stop it?

Lots of internet traffic from the west passes through the US because the destination servers are there, or connect there. Encrypting email usingPGP is one possibility, though it is not easy to set up. Systems such asTor, together with a virtual private network (VPN) connection, can cloak your location, though your identity might still be inferred from the sites you connect to.

afraid of what you are about to suffer. I tell you, the devil will put

some of you in prison to test you, and you will suffer persecution for

ten days. Be faith flu, even to the point of death, and I will give you

life as your victor’s crown.

Whoever has ears, let them hear what the Spirit says to the

churches. The one who is victorious will not be hurt at all by the

second death.

Jude 17-19; But, dear friends, remember what the apostles of our Lord Jesus Christ foretold. They said to you, “In the last times there will be scoffers who will follow their own ungodly desires.” These are the people who divide you, who follow mere natural instincts and do not have the Spirit. Jude 16; These people are grumblers and faultfinders; they follow their own evil desires; they boast about themselves and flatter others for their own advantage.

Revelation 6:15-17; Then the kings of the earth, the princes, the generals, the rich, the mighty, and everyone else, both slave and free, hid in caves and among the rocks of the mountains. They called to the mountains and the rocks, “Fall on us and hide us from the face of him who sits on the throne and from the wrath of the Lamb! For the great day of their wrath has come, and who can withstand it?”

Enter your weight in kilograms and your height in centimeters in the form below and press the "Let's see" button

Your Weight (kg)

Your Height (cm)

Your BMI

My Comment

4-digit Chmod

Superuser

Permission

Owner

Group

Other

setuid

Read

setgid

Write

stickybit

Execute

Value

+

Search JerryKedallisaKiller.com

!doctype>

Click on the "Start count!" button above to start the timer. The input field will count forever, starting at 0. Click on the "Stop count!" button to stop the counting. Click on the "Start count!" button to start the timer again.

!doctype>

Click on the "Start count!" button above to start the timer. The input field will count forever, starting at 0. Click on the "Stop count!" button to stop the counting. Click on the "Start count!" button to start the timer again.

!doctype>

The original image was smiley.gif, but the script changed it to http://i1025.photobucket.com/albums/y311/sainthillisbad/DecemberPhotos/FORMERCIAOFFICERTELL_zpsd78ab714.png